In the current approach to file-based threat handling,
patterns (or definitions) required to protect a client are, for the
most part, delivered on a scheduled basis. Patterns are delivered
in batches from Trend Micro to clients. When a new
update is received, the virus/malware prevention software on the client reloads this batch
of pattern definitions for new virus/malware risks into memory.
If a new virus/malware risk emerges, this pattern once again needs
to be updated partially or fully and reloaded on the client to ensure continued
protection.
Over time, there has been a significant increase in the volume
of unique emerging threats. The increase in the volume of threats
is projected to grow at a near-exponential rate over the coming
years. This amounts to a growth rate that far outnumbers the volume
of currently known security risks. Going forward, the volume of
security risks represents a new type of security risk. The volume of
security risks can impact server and workstation performance, network bandwidth
usage, and, in general, the overall time it takes to deliver quality protection
- or "time to protect".
A new approach to handling the
volume
of threats has been pioneered by
Trend Micro that
aims to make
Trend Micro customers
immune to the threat of virus/malware volume. The technology and
architecture used in this pioneering effort leverages technology
that off-loads the storage of virus/malware signatures and patterns
to the cloud. By off-loading the storage of these virus/malware
signatures to the cloud,
Trend Micro is
able to provide better protection to customers against the future
volume of emerging security risks.